O'Reilly logo

Industrial Network Security, 2nd Edition by Joel Thomas Langill, Eric D. Knapp

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11

Exception, Anomaly, and Threat Detection

Abstract

In addition to point cyber security defenses, behavioral- and anomaly-based threat detection is possible. Learn how to use your knowledge of the process control system and established behavioral baselines to identify potential threats.

Keywords

Exception Reporting
Anomaly Detection
Baseline
Behavior
Information in this Chapter
Exception Reporting
Behavioral Anomaly Detection
Behavioral Whitelisting
Threat Detection
Clear policies about what communications are allowed and what are not have already been obtained by defining zones. The operation within each zone should also be well defined and relatively predictable. This supports two important types of behavioral analysis: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required